CVE-2006-2562
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
24/05/2006
Last modified:
03/04/2025
Description
ZyXEL P-335WT router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:zyxel:p-335wt_router:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/20184
- http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html
- http://www.securityview.org/how-does-the-upnp-flaw-works.html
- http://www.vupen.com/english/advisories/2006/1910
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26710
- http://secunia.com/advisories/20184
- http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html
- http://www.securityview.org/how-does-the-upnp-flaw-works.html
- http://www.vupen.com/english/advisories/2006/1910
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26710



